summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authordann frazier <dannf@debian.org>2008-02-22 22:11:44 +0000
committerdann frazier <dannf@debian.org>2008-02-22 22:11:44 +0000
commit5d576c9b636546030440fdfd07681dfbc39f1531 (patch)
tree9f0c780b099d20c1d0073ef3b71603e5e8ecbe5f
parentbdc9372684fc1c2f6579573dca7cf88e0539a95c (diff)
add new dsa texts
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@1146 e094ebfe-e918-0410-adfb-c712417f3574
-rw-r--r--dsa-texts/2.4.27-10sarge6620
-rw-r--r--dsa-texts/2.6.8-17sarge1486
2 files changed, 1070 insertions, 36 deletions
diff --git a/dsa-texts/2.4.27-10sarge6 b/dsa-texts/2.4.27-10sarge6
index 544b0410..bb2929a7 100644
--- a/dsa-texts/2.4.27-10sarge6
+++ b/dsa-texts/2.4.27-10sarge6
@@ -1,12 +1,10 @@
-Subject: New Linux kernel 2.4.27 packages fix several issues
+------------------------------------------------------------------------
+Debian Security Advisory DSA-1503 security@debian.org
+http://www.debian.org/security/ dann frazier
+February 22, 2008 http://www.debian.org/security/faq
+------------------------------------------------------------------------
---------------------------------------------------------------------------
-Debian Security Advisory DSA XXX-1 security@debian.org
-http://www.debian.org/security/ Dann Frazier
-XXXXX 8th, 2005 http://www.debian.org/security/faq
---------------------------------------------------------------------------
-
-Package : kernel-source-2.4.27
+Package : kernel-source-2.4.27 (2.4.27-10sarge6)
Vulnerability : several
Problem-Type : local/remote
Debian-specific: no
@@ -144,30 +142,31 @@ CVE-2008-0007
exploited by local users to achieve a Denial of Service (DoS) and possibly
execute arbitrary code.
-The following matrix explains which kernel version for which architecture
-fix the problems mentioned above:
-
- Debian 3.1 (sarge)
- Source 2.4.27-10sarge6
- Alpha architecture 2.4.27-10sarge6
- ARM architecture 2.4.27-2sarge6
- Intel IA-32 architecture 2.4.27-10sarge6
- Intel IA-64 architecture 2.4.27-10sarge6
- Motorola 680x0 architecture 2.4.27-3sarge6
- Big endian MIPS 2.4.27-10.sarge4.040815-3
- Little endian MIPS 2.4.27-10.sarge4.040815-3
- PowerPC architecture 2.4.27-10sarge6
- IBM S/390 architecture 2.4.27-2sarge6
- Sun Sparc architecture 2.4.27-9sarge6
-
The following matrix lists additional packages that were rebuilt for
compatibility with or to take advantage of this update:
Debian 3.1 (sarge)
- fai-kernels XXX
- kernel-image-2.4.27-speakup XXX
- mindi-kernel XXX
- systemimager XXX
+ alsa-modules-i386 1.0.8+2sarge2
+ kernel-image-2.4.27-arm 2.4.27-2sarge6
+ kernel-image-2.4.27-m68k 2.4.27-3sarge6
+ kernel-image-speakup-i386 2.4.27-1.1sarge5
+ kernel-image-2.4.27-alpha 2.4.27-10sarge6
+ kernel-image-2.4.27-s390 2.4.27-2sarge6
+ kernel-image-2.4.27-sparc 2.4.27-9sarge6
+ kernel-image-2.4.27-i386 2.4.27-10sarge6
+ kernel-image-2.4.27-ia64 2.4.27-10sarge6
+ kernel-patch-2.4.27-mips 2.4.27-10.sarge4.040815-3
+ kernel-patch-powerpc-2.4.27 2.4.27-10sarge6
+ kernel-latest-2.4-alpha 101sarge3
+ kernel-latest-2.4-i386 101sarge2
+ kernel-latest-2.4-s390 2.4.27-1sarge2
+ kernel-latest-2.4-sparc 42sarge3
+ i2c 1:2.9.1-1sarge2
+ lm-sensors 1:2.9.1-1sarge4
+ mindi-kernel 2.4.27-2sarge5
+ pcmcia-modules-2.4.27-i386 3.2.5+2sarge2
+ hostap-modules-i386 1:0.3.7-1sarge3
+ systemimager 3.2.3-6sarge5
We recommend that you upgrade your kernel package immediately and reboot
the machine. If you have built a custom kernel from the kernel source
@@ -189,14 +188,563 @@ apt-get update
apt-get upgrade
will install corrected packages
-You may use an automated update by adding the resources from the
-footer to the proper configuration.
-
-
-Debian GNU/Linux 3.1 alias sarge
---------------------------------
-
- These files will probably be moved into the stable distribution on
+Note that this update changes various package names due to ABI changes.
+You must therefore have the corresponding upgrade-assist metapackage(s)
+installed for your upgrades to automatically take place. These packages
+have names with the prefix 'kernel-image-2.4-'.
+
+For a full list of the metapackages available for your architecture, run
+the following command on the target Debian 3.1 system:
+ apt-cache search kernel-image-2.4-
+
+Any 3rd party modules that have been built and installed for your system
+will need to be rebuilt and installed for compatability with the new ABI.
+
+Debian 3.1 (oldstable)
+----------------------
+
+Oldstable updates are available for alpha, amd64, arm, hppa, i386, ia64, m68k, mips, mipsel, powerpc, s390 and sparc.
+
+Source archives:
+
+ http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-latest-2.4-i386_101sarge2.dsc
+ Size/MD5 checksum: 1345 4686200ea3a9e29560dffde21e35d247
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-alpha_2.4.27-10sarge6.dsc
+ Size/MD5 checksum: 831 8562d7488f7cb95d205bf76fe110f6c1
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-m68k_2.4.27-3sarge6.dsc
+ Size/MD5 checksum: 876 1a7aac50d25494a39a12da08d10c9139
+ http://security.debian.org/pool/updates/main/i/i2c/i2c_2.9.1-1sarge2.dsc
+ Size/MD5 checksum: 857 2f49354f5660d561153dcdb283a04c60
+ http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-latest-2.4-i386_101sarge2.tar.gz
+ Size/MD5 checksum: 2651 6aff151a16ad2211e6f118efdd2fca6d
+ http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge6.diff.gz
+ Size/MD5 checksum: 783802 57cbeb3a0d58f27c5491ea92ae8760dc
+ http://security.debian.org/pool/updates/main/s/systemimager/systemimager_3.2.3-6sarge5.dsc
+ Size/MD5 checksum: 1027 7152d7aa17c4632a0e9ef450e92d3850
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-s390_2.4.27-2sarge6.tar.gz
+ Size/MD5 checksum: 12009 a9d2d3f315b9e2ddcb835ac35b993e82
+ http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors_2.9.1.orig.tar.gz
+ Size/MD5 checksum: 870765 f5af615e39441d95471bdb72a3f01709
+ http://security.debian.org/pool/updates/main/s/systemimager/systemimager_3.2.3-6sarge5.tar.gz
+ Size/MD5 checksum: 15980836 2ed3cdd33958dbbb79acad51633fed0e
+ http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-alpha/kernel-latest-2.4-alpha_101sarge3.dsc
+ Size/MD5 checksum: 685 3684714d888d9897193781152b1bb2fa
+ http://security.debian.org/pool/updates/main/m/mindi-kernel/mindi-kernel_2.4.27-2sarge5.diff.gz
+ Size/MD5 checksum: 6520 78dd7ab4110563f7cfa41546b7afda57
+ http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-image-speakup-i386_2.4.27-1.1sarge5.tar.gz
+ Size/MD5 checksum: 20360 f80c884ab46b2e419ca401ed21c7d698
+ http://security.debian.org/pool/updates/main/m/mindi-kernel/mindi-kernel_2.4.27.orig.tar.gz
+ Size/MD5 checksum: 9501 a4ad085824ade5641f1c839d945dd301
+ http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-powerpc-2.4.27_2.4.27-10sarge6.dsc
+ Size/MD5 checksum: 1130 67e25655311032dc532f331bfaad529e
+ http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-i386_3.2.5+2sarge2.tar.gz
+ Size/MD5 checksum: 105479 c2b1bb5c024aec2c4938866fda42a536
+ http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-latest-2.4-sparc_42sarge3.dsc
+ Size/MD5 checksum: 846 e49c48cbef5fce4aac4ca3bfd9b97518
+ http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-patch-2.4.27-mips_2.4.27-10.sarge4.040815-3.dsc
+ Size/MD5 checksum: 1050 2930e25b0b2978c257ea94b7c0f385f4
+ http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-latest-2.4-sparc_42sarge3.tar.gz
+ Size/MD5 checksum: 2281 d72e0b2a828d4db9076142f8092a83b0
+ http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-i386_3.2.5+2sarge2.dsc
+ Size/MD5 checksum: 825 1b3ccb11081c743293e515f0864f76f7
+ http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors_2.9.1-1sarge4.diff.gz
+ Size/MD5 checksum: 33474 f96bd95e933f2ad4184a64141a11a375
+ http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-powerpc-2.4.27_2.4.27-10sarge6.tar.gz
+ Size/MD5 checksum: 1466506 4077db3abe1299270d37ab358e8f5443
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-ia64_2.4.27-10sarge6.dsc
+ Size/MD5 checksum: 1143 1434f7f54c70afe26043692c12537e57
+ http://security.debian.org/pool/updates/main/m/mindi-kernel/mindi-kernel_2.4.27-2sarge5.dsc
+ Size/MD5 checksum: 750 2ae692be75bc5bd0ae47105ec3b903e4
+ http://security.debian.org/pool/updates/main/i/i2c/i2c_2.9.1.orig.tar.gz
+ Size/MD5 checksum: 142961 eb3d1df2d3b46f199af2485db612c76d
+ http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors_2.9.1-1sarge4.dsc
+ Size/MD5 checksum: 1089 5f669ca85a85782c1040d45c351d965e
+ http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-s390/kernel-latest-2.4-s390_2.4.27-1sarge2.dsc
+ Size/MD5 checksum: 663 afa6f7006f0e5f28f08f81ab0c0cba7b
+ http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-alpha/kernel-latest-2.4-alpha_101sarge3.tar.gz
+ Size/MD5 checksum: 1987 e4c3061eb307723a40cd3bbc0e28fcc4
+ http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-i386_0.3.7-1sarge3.dsc
+ Size/MD5 checksum: 1092 1682bf8794992d2bd327227cbe21fb77
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-i386_2.4.27-10sarge6.tar.gz
+ Size/MD5 checksum: 101379 c5fde5cda4bc40b613e3eb8389464e00
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-ia64_2.4.27-10sarge6.tar.gz
+ Size/MD5 checksum: 57143 4e1252ccc54094413af132b1e509c78a
+ http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-image-speakup-i386_2.4.27-1.1sarge5.dsc
+ Size/MD5 checksum: 732 c78ef81ca5b402222e7137d1a8052748
+ http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-patch-2.4.27-mips_2.4.27-10.sarge4.040815-3.tar.gz
+ Size/MD5 checksum: 310504 a95d863d77233921e79185c3dac62f94
+ http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-s390/kernel-latest-2.4-s390_2.4.27-1sarge2.tar.gz
+ Size/MD5 checksum: 1629 631165e8731c66fc60e875371c649a03
+ http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge6.dsc
+ Size/MD5 checksum: 900 cacb4fcef0ee57a53ba0efbfcae9d3cf
+ http://security.debian.org/pool/updates/main/i/i2c/i2c_2.9.1-1sarge2.diff.gz
+ Size/MD5 checksum: 9671 afae6ba433c81376fc42fb5de1750169
+ http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27.orig.tar.gz
+ Size/MD5 checksum: 38470181 56df34508cdc47a53d15bc02ffe4f42d
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-m68k_2.4.27-3sarge6.tar.gz
+ Size/MD5 checksum: 14303 50eac91503e4d951e8c555470526c56d
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-arm_2.4.27-2sarge6.dsc
+ Size/MD5 checksum: 839 09f407768d0a85fa121f68595bf6d9da
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-i386_2.4.27-10sarge6.dsc
+ Size/MD5 checksum: 1582 d905f8b5191e92587b2694776bfd2162
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-alpha_2.4.27-10sarge6.tar.gz
+ Size/MD5 checksum: 33837 94e6565cd478f866a0f079b8d5de5b1e
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-sparc_2.4.27-9sarge6.dsc
+ Size/MD5 checksum: 1074 872a5a07e8a19c0544ca02dccc59730c
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-arm_2.4.27-2sarge6.tar.gz
+ Size/MD5 checksum: 37326 dcdb061379c1e912712be472ef423a2e
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-s390_2.4.27-2sarge6.dsc
+ Size/MD5 checksum: 832 e877d255836a119568f2b811484509a8
+ http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-i386_0.3.7-1sarge3.tar.gz
+ Size/MD5 checksum: 2328 c3f3f0a00cd017334a3d045142f11b6f
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-sparc_2.4.27-9sarge6.tar.gz
+ Size/MD5 checksum: 26268 6401b539084d362190963c16487ac91d
+
+Architecture independent packages:
+
+ http://security.debian.org/pool/updates/main/i/i2c/i2c-source_2.9.1-1sarge2_all.deb
+ Size/MD5 checksum: 159972 52f3d8c35dc66b3806fdcbd5911172ef
+ http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-doc-2.4.27-speakup_2.4.27-1.1sarge5_all.deb
+ Size/MD5 checksum: 2424128 6bc37ebffcc8af7d71edabbc29edff9e
+ http://security.debian.org/pool/updates/main/s/systemimager/systemimager-server_3.2.3-6sarge5_all.deb
+ Size/MD5 checksum: 119874 6320eef7e64b58239bbf976787178a86
+ http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-patch-debian-2.4.27_2.4.27-10sarge6_all.deb
+ Size/MD5 checksum: 752214 ea5d65d5f1c650e0b9d7db4373df65b4
+ http://security.debian.org/pool/updates/main/l/lm-sensors/kernel-patch-2.4-lm-sensors_2.9.1-1sarge4_all.deb
+ Size/MD5 checksum: 304594 17171ede79299ea662c0eb92c09d7b89
+ http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-tree-2.4.27_2.4.27-10sarge6_all.deb
+ Size/MD5 checksum: 28966 2f946b48d7784fd66e1833972999b091
+ http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge6_all.deb
+ Size/MD5 checksum: 31485082 d8e3315c288f5550386686d4f56b945b
+ http://security.debian.org/pool/updates/main/s/systemimager/systemimager-client_3.2.3-6sarge5_all.deb
+ Size/MD5 checksum: 32790 6e1a1822035ee3eacd9b64adc1e9af57
+ http://security.debian.org/pool/updates/main/s/systemimager/systemimager-server-flamethrowerd_3.2.3-6sarge5_all.deb
+ Size/MD5 checksum: 18512 8f686699219008d35136f3eda8846894
+ http://security.debian.org/pool/updates/main/s/systemimager/systemimager-boot-ia64-standard_3.2.3-6sarge5_all.deb
+ Size/MD5 checksum: 9548918 f2d22e050aec4e3cdef89fa36d0a1acd
+ http://security.debian.org/pool/updates/main/i/i2c/kernel-patch-2.4-i2c_2.9.1-1sarge2_all.deb
+ Size/MD5 checksum: 106162 c020f32c2b9c0bb3f60a8d7aa536202b
+ http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-doc-2.4.27_2.4.27-10sarge6_all.deb
+ Size/MD5 checksum: 3590114 333eed9fc4f7de67d8d348b4437e212d
+ http://security.debian.org/pool/updates/main/s/systemimager/systemimager-doc_3.2.3-6sarge5_all.deb
+ Size/MD5 checksum: 633864 aa02fdc51feb16ab51aa2d0b864b5033
+ http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors-source_2.9.1-1sarge4_all.deb
+ Size/MD5 checksum: 945778 b5cd269a473566b2eab20477bb5ccc75
+ http://security.debian.org/pool/updates/main/s/systemimager/systemimager-boot-i386-standard_3.2.3-6sarge5_all.deb
+ Size/MD5 checksum: 4762284 0e4f9547acf07ac7eac578acd7062289
+ http://security.debian.org/pool/updates/main/s/systemimager/systemimager-common_3.2.3-6sarge5_all.deb
+ Size/MD5 checksum: 32908 c38aa76390664cd61cd39fcafdc061e3
+
+alpha architecture (DEC Alpha)
+
+ http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-alpha/kernel-headers-2.4-generic_101sarge3_alpha.deb
+ Size/MD5 checksum: 2004 b85b43e7e593767ac3c2e9759800441c
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-4-generic_2.4.27-10sarge6_alpha.deb
+ Size/MD5 checksum: 275104 ac124d1aef568fc04144cfde499ba818
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-4-smp_2.4.27-10sarge6_alpha.deb
+ Size/MD5 checksum: 16991940 3644d797f1b4f4fe17810fc128ecfef2
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-build-2.4.27-4_2.4.27-10sarge6_alpha.deb
+ Size/MD5 checksum: 9536 818db9ca2e9411bd9395956f8a466850
+ http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-3_alpha.deb
+ Size/MD5 checksum: 21868 b3b80288bf4fa33ee8173b71396b1ed8
+ http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-alpha/kernel-image-2.4-generic_101sarge3_alpha.deb
+ Size/MD5 checksum: 2008 44d187a24b738878ec0624a096fdb5f4
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-4-smp_2.4.27-10sarge6_alpha.deb
+ Size/MD5 checksum: 277016 f7a91380e5f5a795a4eccfcff273a2b1
+ http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-alpha/kernel-image-2.4-smp_101sarge3_alpha.deb
+ Size/MD5 checksum: 2016 55ea69109097ddcc254609df82c98e91
+ http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-alpha/kernel-headers-2.4-smp_101sarge3_alpha.deb
+ Size/MD5 checksum: 2010 5095855832ed1006e4d11c2d9e0325b7
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-4-generic_2.4.27-10sarge6_alpha.deb
+ Size/MD5 checksum: 16537164 250c932f3b2048587f8dc8e41ab26926
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-4_2.4.27-10sarge6_alpha.deb
+ Size/MD5 checksum: 4649894 e46f99205e2b499dabf3e13b6778d776
+
+amd64 architecture (AMD x86_64 (AMD64))
+
+ http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-3_amd64.deb
+ Size/MD5 checksum: 18612 89c5c3f01d1715252ac3ec8ba363b9de
+
+arm architecture (ARM)
+
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-bast_2.4.27-2sarge6_arm.deb
+ Size/MD5 checksum: 1698658 af8a1eb0a1eab58c562f639343ee5101
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-lart_2.4.27-2sarge6_arm.deb
+ Size/MD5 checksum: 1062484 fdac028111ef3d2a5bf226e21d74b394
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-build-2.4.27_2.4.27-2sarge6_arm.deb
+ Size/MD5 checksum: 484774 106d72fdc046ad8ab48bf45aff7319da
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-riscpc_2.4.27-2sarge6_arm.deb
+ Size/MD5 checksum: 3168914 a7539fe4daefea79532eda6846e92382
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-headers-2.4.27_2.4.27-2sarge6_arm.deb
+ Size/MD5 checksum: 4728038 305dbb3ab1d46dbeac5aeb1db685853e
+ http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-3_arm.deb
+ Size/MD5 checksum: 20346 1976571746db1bdc1ce05b0638cde4c7
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-netwinder_2.4.27-2sarge6_arm.deb
+ Size/MD5 checksum: 7379444 1d96d07f4b98258c48e37a3ce3fb9816
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-riscstation_2.4.27-2sarge6_arm.deb
+ Size/MD5 checksum: 3693056 ec852f94b459dec72e9e776d7b7babdf
+
+hppa architecture (HP PA RISC)
+
+ http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-3_hppa.deb
+ Size/MD5 checksum: 20722 f9b295e020b4898e0cee48fa9d1ab90e
+
+i386 architecture (Intel ia32)
+
+ http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-image-2.4-k7_101sarge2_i386.deb
+ Size/MD5 checksum: 2190 de7c785f29cfac9758d90c48c8eb5bca
+ http://security.debian.org/pool/updates/main/i/i2c/i2c-2.4.27-4-386_2.9.1-1sarge2_i386.deb
+ Size/MD5 checksum: 77904 8e0633c48d4a196eb7d750f75bd7068a
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-4-k7-smp_2.4.27-10sarge6_i386.deb
+ Size/MD5 checksum: 301002 3aab4d4883d87b229d48fac30d41e603
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-4-k7_2.4.27-10sarge6_i386.deb
+ Size/MD5 checksum: 296070 d790eb36fc3213aefb7deba17a3cbeeb
+ http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-headers-2.4-686_101sarge2_i386.deb
+ Size/MD5 checksum: 2250 4d72f7bd505333cee3e3e6fe24b35cfc
+ http://security.debian.org/pool/updates/main/i/i2c/i2c-2.4.27-4-k7_2.9.1-1sarge2_i386.deb
+ Size/MD5 checksum: 77702 fec475b02fa1569acc7a2fd254736c89
+ http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-image-2.4.27-speakup_2.4.27-1.1sarge5_i386.deb
+ Size/MD5 checksum: 11314694 5d9e7fbdcfde268a978f4c57bac8a445
+ http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-headers-2.4-386_101sarge2_i386.deb
+ Size/MD5 checksum: 2210 94453df286d5f4e53129c9ad21c48269
+ http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.6.8-4-686_0.3.7-1sarge3_i386.deb
+ Size/MD5 checksum: 165342 2d7a7d95cd8659cbae4a293ed5247443
+ http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-image-2.4-k7-smp_101sarge2_i386.deb
+ Size/MD5 checksum: 2258 e07b801edb75bff62ff274577b74e41f
+ http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-3_i386.deb
+ Size/MD5 checksum: 17980 2811fbff5ff6904b4100d713b48ccffc
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-4-386_2.4.27-10sarge6_i386.deb
+ Size/MD5 checksum: 301320 9017891e4c79068047e4af5cb929c31c
+ http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-4-586tsc_3.2.5+2sarge2_i386.deb
+ Size/MD5 checksum: 477780 65991feae9a3464324fb4fd9a380ef00
+ http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors-2.4.27-4-k6_2.9.1-1sarge4_i386.deb
+ Size/MD5 checksum: 33488 b11e22c02586f81d1ce395ae1244428e
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-4-k7-smp_2.4.27-10sarge6_i386.deb
+ Size/MD5 checksum: 12439378 fbc7f2c6e8a05225049e8cc5ff42fc32
+ http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-pcmcia-modules-2.4-686_101sarge2_i386.deb
+ Size/MD5 checksum: 2232 ca5ab5706cf7092c57853b73611ccf37
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-4-686_2.4.27-10sarge6_i386.deb
+ Size/MD5 checksum: 12357440 3892ecb2b0fb49a3ade013e27485320d
+ http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-4-k6_3.2.5+2sarge2_i386.deb
+ Size/MD5 checksum: 477686 7b9b7b5442441dc35b0d17f785dfce87
+ http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors-2.4.27-4-386_2.9.1-1sarge4_i386.deb
+ Size/MD5 checksum: 33496 dc6d281fab6c1ab610e419758fd7b895
+ http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-headers-2.4-k7-smp_101sarge2_i386.deb
+ Size/MD5 checksum: 2290 3656872aeedf815c3fb157e27a35aeed
+ http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-image-2.4-586tsc_101sarge2_i386.deb
+ Size/MD5 checksum: 2200 99dc53e529fe3780b87ebea56bc3a9e2
+ http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors-2.4.27-4-686-smp_2.9.1-1sarge4_i386.deb
+ Size/MD5 checksum: 33504 4683e862b99aee94cce49c7e24f4ca8d
+ http://security.debian.org/pool/updates/main/l/lm-sensors/libsensors3_2.9.1-1sarge4_i386.deb
+ Size/MD5 checksum: 77984 62558920315cbde876f88380f87a577d
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-4-586tsc_2.4.27-10sarge6_i386.deb
+ Size/MD5 checksum: 301974 e32d1efb04c53424e0b8760e155e807c
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-4_2.4.27-10sarge6_i386.deb
+ Size/MD5 checksum: 1857996 3727b12f2acaa3429b9f845c5fafa4b2
+ http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-image-2.4-686_101sarge2_i386.deb
+ Size/MD5 checksum: 2208 ecaf8a85eeab65f53b7cfc369e872741
+ http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-image-2.4-386_101sarge2_i386.deb
+ Size/MD5 checksum: 2180 d493e7439c2ac668aa8af8e300476a32
+ http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-headers-2.4-k6_101sarge2_i386.deb
+ Size/MD5 checksum: 2236 9899de5f907ce3bf505230f57e8e977f
+ http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-pcmcia-modules-2.4-686-smp_101sarge2_i386.deb
+ Size/MD5 checksum: 2296 cf0ed26b54117f21c940785dd5cd6361
+ http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-pcmcia-modules-2.4-386_101sarge2_i386.deb
+ Size/MD5 checksum: 2200 8b295e8d54d56803114aca936edb9b3b
+ http://security.debian.org/pool/updates/main/i/i2c/i2c-2.4.27-4-k7-smp_2.9.1-1sarge2_i386.deb
+ Size/MD5 checksum: 77762 7cd84fb3f7ccac997edf9ad814f596fc
+ http://security.debian.org/pool/updates/main/i/i2c/i2c-2.4.27-4-686-smp_2.9.1-1sarge2_i386.deb
+ Size/MD5 checksum: 77702 c33cd973e0b5f4426e1ff15c2b07bb93
+ http://security.debian.org/pool/updates/main/i/i2c/i2c-2.4.27-4-686_2.9.1-1sarge2_i386.deb
+ Size/MD5 checksum: 77634 8fd76652c4e0c63f65a06a596306f7e2
+ http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-headers-2.4-586tsc_101sarge2_i386.deb
+ Size/MD5 checksum: 2232 56e34da6218d5a9f5c495dbfa5b55234
+ http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.6.8-4-686-smp_0.3.7-1sarge3_i386.deb
+ Size/MD5 checksum: 169666 5ab7867f5d9fa479e8a8f96cd6fa9fc8
+ http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.4.27-4-k7_0.3.7-1sarge3_i386.deb
+ Size/MD5 checksum: 2458 fde4680c9802476653d87385f7553110
+ http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-headers-2.4-686-smp_101sarge2_i386.deb
+ Size/MD5 checksum: 2320 7e9d9c4d9e27630f3177f0ed33445958
+ http://security.debian.org/pool/updates/main/i/i2c/i2c-2.4.27-4-k6_2.9.1-1sarge2_i386.deb
+ Size/MD5 checksum: 77642 de16e1b5ef4844c9b3619c6d0866a06c
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-4-686-smp_2.4.27-10sarge6_i386.deb
+ Size/MD5 checksum: 307908 3a4cfc236fd895b79aa34a61aa25f4ea
+ http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.4.27-4-586tsc_0.3.7-1sarge3_i386.deb
+ Size/MD5 checksum: 2452 448ea77ae78b84b31074c06310abff2d
+ http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.4.27-4-686-smp_0.3.7-1sarge3_i386.deb
+ Size/MD5 checksum: 2466 630fcf555d96bbefe36adc031b1590dd
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-4-686-smp_2.4.27-10sarge6_i386.deb
+ Size/MD5 checksum: 303850 d3105a688746ddd36d618018e9b53d1a
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-4-586tsc_2.4.27-10sarge6_i386.deb
+ Size/MD5 checksum: 296314 a124cb2d7c7cc1a0462f34f40f341eef
+ http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-pcmcia-modules-2.4-k7-smp_101sarge2_i386.deb
+ Size/MD5 checksum: 2278 5747a8a13621d34006e02e12ddecfdf5
+ http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-headers-2.4.27-speakup_2.4.27-1.1sarge5_i386.deb
+ Size/MD5 checksum: 4845086 75f294bc16c692a9d047cacfab9e843b
+ http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors-2.4.27-4-686_2.9.1-1sarge4_i386.deb
+ Size/MD5 checksum: 33492 869083538e79481e56094549c5321cd0
+ http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.4.27-4-386_0.3.7-1sarge3_i386.deb
+ Size/MD5 checksum: 2446 d0f3f731301d12a7e83e0adc5e6faab5
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-4-k7_2.4.27-10sarge6_i386.deb
+ Size/MD5 checksum: 12107272 6b1b8f925a1ff13b140f061215f47e09
+ http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.6.8-4-k7_0.3.7-1sarge3_i386.deb
+ Size/MD5 checksum: 163754 ac42725375d4e828b4220d84f7f92ef7
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-4-686-smp_2.4.27-10sarge6_i386.deb
+ Size/MD5 checksum: 12700924 759c414f04d4765e26c2b40957fc9ab4
+ http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.6.8-4-k7-smp_0.3.7-1sarge3_i386.deb
+ Size/MD5 checksum: 168080 6dbbcfbcef54fcef4106675d84bf75c1
+ http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-4-k7_3.2.5+2sarge2_i386.deb
+ Size/MD5 checksum: 477716 568d8b1052dbaff75b1d08e75b503dc9
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-4-k6_2.4.27-10sarge6_i386.deb
+ Size/MD5 checksum: 301394 09804682d0b2db2150fab0a9bd95d163
+ http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.4.27-4-k6_0.3.7-1sarge3_i386.deb
+ Size/MD5 checksum: 2462 1f0c32839c6fac5010d7a37bd29ac335
+ http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.6.8-4-386_0.3.7-1sarge3_i386.deb
+ Size/MD5 checksum: 147744 f4e889628f1479ca845848c374ba94d4
+ http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-pcmcia-modules-2.4-k7_101sarge2_i386.deb
+ Size/MD5 checksum: 2214 cceb0bf335f590d45b56060150be29e6
+ http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-4-k7-smp_3.2.5+2sarge2_i386.deb
+ Size/MD5 checksum: 484410 1b0e0136ac477ad58a991da10fef9275
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-4-686_2.4.27-10sarge6_i386.deb
+ Size/MD5 checksum: 302266 db4c30615a7cbdd1dc4e81b23b5e9a03
+ http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-4-686_3.2.5+2sarge2_i386.deb
+ Size/MD5 checksum: 477742 b5fcc0041e57a89f2497a94934ab051f
+ http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors-2.4.27-4-k7-smp_2.9.1-1sarge4_i386.deb
+ Size/MD5 checksum: 33500 84fe5e6f5efe32f98d65732bbfe658ab
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-4-686_2.4.27-10sarge6_i386.deb
+ Size/MD5 checksum: 302150 0acd56708c0e9b1eb13ed65c301eb4e5
+ http://security.debian.org/pool/updates/main/l/lm-sensors/libsensors-dev_2.9.1-1sarge4_i386.deb
+ Size/MD5 checksum: 94012 2f7dd855a2776ace2161f61c9da880d4
+ http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-pcmcia-modules-2.4-586tsc_101sarge2_i386.deb
+ Size/MD5 checksum: 2218 6c564fa8fbe8eb3fed7547f363a5f3d3
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-4-k7_2.4.27-10sarge6_i386.deb
+ Size/MD5 checksum: 302272 00ce79f3215cf690cd6f9a5d588fb46a
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-4-k6_2.4.27-10sarge6_i386.deb
+ Size/MD5 checksum: 11725582 1a891346b963cea2591e0c2a2b40d418
+ http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-headers-2.4-k7_101sarge2_i386.deb
+ Size/MD5 checksum: 2228 e49a7f6a1ebf9217ca427fe98bef9ef5
+ http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-pcmcia-modules-2.4-k6_101sarge2_i386.deb
+ Size/MD5 checksum: 2212 c596e89ceb9694a47531542a81618fe8
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-build-2.4.27-4_2.4.27-10sarge6_i386.deb
+ Size/MD5 checksum: 11964 5eaca507dc75c7dd8a5fea8a98adae17
+ http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-image-2.4-k6_101sarge2_i386.deb
+ Size/MD5 checksum: 2192 ed4d6c14605c790b4b1514479cf2a4dc
+ http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.4.27-4-686_0.3.7-1sarge3_i386.deb
+ Size/MD5 checksum: 2454 51c30ec77e9345f6eb930a2684cc72f9
+ http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors-2.4.27-4-k7_2.9.1-1sarge4_i386.deb
+ Size/MD5 checksum: 33488 b83277fd8366c6120159be2d61c219cc
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-4-386_2.4.27-10sarge6_i386.deb
+ Size/MD5 checksum: 271418 0ece32ae57e8bc07909d472a27f75fad
+ http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors-2.4.27-4-586tsc_2.9.1-1sarge4_i386.deb
+ Size/MD5 checksum: 33506 b8318c2a64dfc2ed3a6997c958d2d4a8
+ http://security.debian.org/pool/updates/main/m/mindi-kernel/mindi-kernel_2.4.27-2sarge5_i386.deb
+ Size/MD5 checksum: 7773920 5ce6990c1c05480e64d479e63e8e573c
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-4-k6_2.4.27-10sarge6_i386.deb
+ Size/MD5 checksum: 290140 ac3904823f38ee87f5d474b97989f1b7
+ http://security.debian.org/pool/updates/main/i/i2c/i2c-2.4.27-4-586tsc_2.9.1-1sarge2_i386.deb
+ Size/MD5 checksum: 77644 e74884dab42407313589891ff9bab2ec
+ http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-4-686-smp_3.2.5+2sarge2_i386.deb
+ Size/MD5 checksum: 484382 3ce4020ba4761da02bf838277169b514
+ http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-image-2.4-686-smp_101sarge2_i386.deb
+ Size/MD5 checksum: 2274 a0ae0ea68ab8e0ad0b5c7ce84c648205
+ http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors_2.9.1-1sarge4_i386.deb
+ Size/MD5 checksum: 474474 1e8df851476f1d44b88888c9c67ea104
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-4-386_2.4.27-10sarge6_i386.deb
+ Size/MD5 checksum: 11052808 11a2d541ae4be60fc4ca0b012e040731
+ http://security.debian.org/pool/updates/main/l/lm-sensors/sensord_2.9.1-1sarge4_i386.deb
+ Size/MD5 checksum: 56474 1f0f3fa67108dbde771d44446870feb1
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-4-k7-smp_2.4.27-10sarge6_i386.deb
+ Size/MD5 checksum: 303960 a0124d96976fdb5295d88e4452c3e482
+ http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.4.27-4-k7-smp_0.3.7-1sarge3_i386.deb
+ Size/MD5 checksum: 2466 b429be79430479aa6195e9be4df2df32
+ http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-4-386_3.2.5+2sarge2_i386.deb
+ Size/MD5 checksum: 477778 b11e7c242050e16293ad1163f60770cb
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-4-586tsc_2.4.27-10sarge6_i386.deb
+ Size/MD5 checksum: 12040558 85ecbc317471b19622aa4c881787ccc4
+
+ia64 architecture (Intel ia64)
+
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-mckinley-smp_2.4.27-10sarge6_ia64.deb
+ Size/MD5 checksum: 8784 90ee1b2e9043eb5c304e341e4341f307
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-4-mckinley-smp_2.4.27-10sarge6_ia64.deb
+ Size/MD5 checksum: 16989836 ac671a15b2e59ab7e740fba0a275fdeb
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-4-itanium_2.4.27-10sarge6_ia64.deb
+ Size/MD5 checksum: 244176 e992f7a9972a853416b9d661b9b1ed27
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-4-mckinley_2.4.27-10sarge6_ia64.deb
+ Size/MD5 checksum: 16635868 a9d4e077e6988de487f454462be71b29
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-4-itanium_2.4.27-10sarge6_ia64.deb
+ Size/MD5 checksum: 16682160 4a0aad4af20efe7b377632b2fa1ecac7
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-4-mckinley_2.4.27-10sarge6_ia64.deb
+ Size/MD5 checksum: 244174 97772e1967c86e1049a31bc3945d55bc
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-itanium-smp_2.4.27-10sarge6_ia64.deb
+ Size/MD5 checksum: 8762 1798dbe17258645061927e62084de5eb
+ http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-3_ia64.deb
+ Size/MD5 checksum: 23596 0809bc03e9bbed87e20c1cd7a1775e57
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-4-itanium-smp_2.4.27-10sarge6_ia64.deb
+ Size/MD5 checksum: 245076 794bce10f1d65a28defc12609330a563
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-mckinley_2.4.27-10sarge6_ia64.deb
+ Size/MD5 checksum: 8774 c8b8a58a500877b95d05baca618b177c
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-4-mckinley-smp_2.4.27-10sarge6_ia64.deb
+ Size/MD5 checksum: 245194 d697c585822843bf50471b6e8d21242e
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-4-itanium-smp_2.4.27-10sarge6_ia64.deb
+ Size/MD5 checksum: 17044112 c6b9372d496ca07bc3b67be07ebba31b
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-itanium_2.4.27-10sarge6_ia64.deb
+ Size/MD5 checksum: 8744 d80a7c62442813fb1e25bfee7f1f48b7
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-4_2.4.27-10sarge6_ia64.deb
+ Size/MD5 checksum: 4762160 59ddcd5f8c89ceae7140b501cf215fa8
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-build-2.4.27-4_2.4.27-10sarge6_ia64.deb
+ Size/MD5 checksum: 8980 811a0f52aaf2699fcf5ce0b1f1a0bdbd
+
+m68k architecture (Motorola Mc680x0)
+
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-amiga_2.4.27-3sarge6_m68k.deb
+ Size/MD5 checksum: 2636312 ebf015a5cde926e2203d59ca336859e7
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-mac_2.4.27-3sarge6_m68k.deb
+ Size/MD5 checksum: 2476770 5876a64c1242781d5f15351b3fe8f180
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-mvme16x_2.4.27-3sarge6_m68k.deb
+ Size/MD5 checksum: 2395372 017278dac5baccad9a4b779d1863bf0f
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-mvme147_2.4.27-3sarge6_m68k.deb
+ Size/MD5 checksum: 2323460 164b52f450e86d51b99bd8647fefed2d
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-bvme6000_2.4.27-3sarge6_m68k.deb
+ Size/MD5 checksum: 2394638 73a3bbff4db6f767123d09be3656f6ff
+ http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-3_m68k.deb
+ Size/MD5 checksum: 17720 5a457bcf29fec4d35faecb504fff648a
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-atari_2.4.27-3sarge6_m68k.deb
+ Size/MD5 checksum: 2543642 334a1c3125131e8844fb5de91fff3dd9
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-q40_2.4.27-3sarge6_m68k.deb
+ Size/MD5 checksum: 2260822 f5528d8ff99980a0f9bf3c8e8fc9e06c
+
+mips architecture (MIPS (Big Endian))
+
+ http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r5k-ip22_2.4.27-10.sarge4.040815-3_mips.deb
+ Size/MD5 checksum: 3879754 69d856bdbd22525f9e04ddf072189f67
+ http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-headers-2.4.27_2.4.27-10.sarge4.040815-3_mips.deb
+ Size/MD5 checksum: 4763440 587a59f384c23f18d6d9cfae96ebec35
+ http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-sb1-swarm-bn_2.4.27-10.sarge4.040815-3_mips.deb
+ Size/MD5 checksum: 7223008 717e19d7db9d95429064ed8bc71410fe
+ http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-3_mips.deb
+ Size/MD5 checksum: 21544 8b2e659f7e486d086a876157faac6af2
+ http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r4k-ip22_2.4.27-10.sarge4.040815-3_mips.deb
+ Size/MD5 checksum: 3878278 70aab4ac78bbbaf2efb8ab726df4ba00
+
+mipsel architecture (MIPS (Little Endian))
+
+ http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r5k-lasat_2.4.27-10.sarge4.040815-3_mipsel.deb
+ Size/MD5 checksum: 2144874 50c5ff9db6a00ba939f7b7eb9a55814c
+ http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r5k-cobalt_2.4.27-10.sarge4.040815-3_mipsel.deb
+ Size/MD5 checksum: 4112030 89122df58404e5d46f0a94f160066077
+ http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-headers-2.4.27_2.4.27-10.sarge4.040815-3_mipsel.deb
+ Size/MD5 checksum: 4756972 b8024d146f7f13bded7a6424ddfa4135
+ http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-xxs1500_2.4.27-10.sarge4.040815-3_mipsel.deb
+ Size/MD5 checksum: 4681486 f4fb5fab0de0a25fc7884c1c2f2f7340
+ http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-3_mipsel.deb
+ Size/MD5 checksum: 21876 4ab08ad75e84cc2be8b05b9e4ba5e4ef
+ http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r4k-kn04_2.4.27-10.sarge4.040815-3_mipsel.deb
+ Size/MD5 checksum: 3002730 79d768298894c6534408fa4867ab5b14
+ http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r3k-kn02_2.4.27-10.sarge4.040815-3_mipsel.deb
+ Size/MD5 checksum: 3042270 6a1ce29b2ce437516e64def1738c370f
+ http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-sb1-swarm-bn_2.4.27-10.sarge4.040815-3_mipsel.deb
+ Size/MD5 checksum: 7049768 2ceaae0ecc0f1feb753bdad506280185
+
+powerpc architecture (PowerPC)
+
+ http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-3_powerpc.deb
+ Size/MD5 checksum: 20340 7f20372a9ab62ca36586defd15b0a5ee
+ http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-powerpc-small_2.4.27-10sarge6_powerpc.deb
+ Size/MD5 checksum: 12763130 f7a7340904b21ed0a5486174ae810052
+ http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-powerpc-smp_2.4.27-10sarge6_powerpc.deb
+ Size/MD5 checksum: 13795002 826cb8d8fa3d3c3cab66f89df073deeb
+ http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-nubus_2.4.27-10sarge6_powerpc.deb
+ Size/MD5 checksum: 1822940 205748952ae7948db55771e71ac21f56
+ http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-powerpc_2.4.27-10sarge6_powerpc.deb
+ Size/MD5 checksum: 13490792 4f0010db40e43f778ce570e95a06551f
+ http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-2.4.27-powerpc_2.4.27-10sarge6_powerpc.deb
+ Size/MD5 checksum: 12268 d5b7af76b08c231639d192940e81a43e
+ http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-2.4.27-nubus_2.4.27-10sarge6_powerpc.deb
+ Size/MD5 checksum: 12344 d068007806c2e699271c71508fc1e84b
+ http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-headers-2.4.27-powerpc_2.4.27-10sarge6_powerpc.deb
+ Size/MD5 checksum: 4874608 8707c0663aa5822a73d16352907c95eb
+ http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-apus_2.4.27-10sarge6_powerpc.deb
+ Size/MD5 checksum: 145224 7aaa0cf1c764ec0b8924787e61b638d4
+ http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-headers-2.4.27-nubus_2.4.27-10sarge6_powerpc.deb
+ Size/MD5 checksum: 4767046 31d52974cc78bd5a3609a21da97971d3
+ http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-2.4.27-apus_2.4.27-10sarge6_powerpc.deb
+ Size/MD5 checksum: 69216 29e20e7d40917be81aa249d8bf88194f
+ http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-apus_2.4.27-10sarge6_powerpc.deb
+ Size/MD5 checksum: 2505832 7a648cfd329f18cd56f758c5365a3c8c
+ http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-headers-2.4.27-apus_2.4.27-10sarge6_powerpc.deb
+ Size/MD5 checksum: 4758074 63ed1a37308075d0b9c85dacb3025f87
+ http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-powerpc-smp_2.4.27-10sarge6_powerpc.deb
+ Size/MD5 checksum: 158946 ab63071c1853718aecce65cd3a33e1a2
+ http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-nubus_2.4.27-10sarge6_powerpc.deb
+ Size/MD5 checksum: 145044 a36ed8999258cfb8519c7b46a22e0e17
+ http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-powerpc_2.4.27-10sarge6_powerpc.deb
+ Size/MD5 checksum: 158876 436532d564b7c34fe9ff134c44b28ac2
+ http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-powerpc-small_2.4.27-10sarge6_powerpc.deb
+ Size/MD5 checksum: 159174 4562756f69ef7a3c639334b3dece3835
+
+s390 architecture (IBM S/390)
+
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-4-s390-tape_2.4.27-2sarge6_s390.deb
+ Size/MD5 checksum: 997526 9d7687e5a7d1d6930f9b12c8dbd2da86
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-4-s390x_2.4.27-2sarge6_s390.deb
+ Size/MD5 checksum: 2977638 d0e71d007359ea5fd412814b6307e05b
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-headers-2.4.27-4_2.4.27-2sarge6_s390.deb
+ Size/MD5 checksum: 4653304 1ef9845750b94c5034c83c9fbca61680
+ http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-s390/kernel-headers-2.4-s390_2.4.27-1sarge2_s390.deb
+ Size/MD5 checksum: 1916 5f3a222f65f28cc02c3dac36d9fae589
+ http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-s390/kernel-image-2.4-s390x_2.4.27-1sarge2_s390.deb
+ Size/MD5 checksum: 1904 e82185af5c4ffc366c91a62c3710b0f7
+ http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-3_s390.deb
+ Size/MD5 checksum: 20724 35eee44d510c23faa0d5980c8e042eed
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-4-s390_2.4.27-2sarge6_s390.deb
+ Size/MD5 checksum: 2785758 f0ee3b3b6eb3ff47a5ab1c8bff6541f5
+ http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-s390/kernel-image-2.4-s390_2.4.27-1sarge2_s390.deb
+ Size/MD5 checksum: 1902 e50783f20196403fdb201296faa5f955
+
+sparc architecture (Sun SPARC/UltraSPARC)
+
+ http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-image-2.4-sparc64-smp_42sarge3_sparc.deb
+ Size/MD5 checksum: 2224 3640903c50cf3f5ac3ca07e4f1a23e4c
+ http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-image-2.4-sparc32-smp_42sarge3_sparc.deb
+ Size/MD5 checksum: 2228 e25173a6212f5788a1eee7272033d92e
+ http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-image-2.4-sparc32_42sarge3_sparc.deb
+ Size/MD5 checksum: 2208 2245a85962621b06eab854d81f5e2bd9
+ http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-image-2.4-sparc64_42sarge3_sparc.deb
+ Size/MD5 checksum: 2210 c67bc9270fa69033579ded9a949b0c40
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-4-sparc32-smp_2.4.27-9sarge6_sparc.deb
+ Size/MD5 checksum: 3796458 c3c25c364e5c6c8eaf5fc73c95d53095
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-4-sparc32_2.4.27-9sarge6_sparc.deb
+ Size/MD5 checksum: 166596 ee5ba57e8ee80b5e7aedd28223db597f
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-4-sparc64_2.4.27-9sarge6_sparc.deb
+ Size/MD5 checksum: 204932 f8d2bd0fa36e751487006104cad3edc8
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-4-sparc64-smp_2.4.27-9sarge6_sparc.deb
+ Size/MD5 checksum: 206334 a659ec6ca6d0fbd1514c5423bac879e9
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-4_2.4.27-9sarge6_sparc.deb
+ Size/MD5 checksum: 2063174 5f91e658e46a6d7b7bdf184bc51d5868
+ http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-headers-2.4-sparc64-smp_42sarge3_sparc.deb
+ Size/MD5 checksum: 2238 59514eec80d5fdf2e92cb943c50eb9b9
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-4-sparc32-smp_2.4.27-9sarge6_sparc.deb
+ Size/MD5 checksum: 168392 a0c16b5ed34ca2a6f7b2ed8bdab19f84
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-4-sparc32_2.4.27-9sarge6_sparc.deb
+ Size/MD5 checksum: 3607258 a5c1e2b59cb0c343a22ea70a1c125692
+ http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-headers-2.4-sparc32-smp_42sarge3_sparc.deb
+ Size/MD5 checksum: 2238 b603643edb3cdd828155317d85cc46ef
+ http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-headers-2.4-sparc64_42sarge3_sparc.deb
+ Size/MD5 checksum: 2228 aac7dfd77156b6b90ca18fc8c1cff974
+ http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-3_sparc.deb
+ Size/MD5 checksum: 19570 151b78bcb24f03464721cd886ccd9a85
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-build-2.4.27-4_2.4.27-9sarge6_sparc.deb
+ Size/MD5 checksum: 12010 a1c148d768477fc35842fdd0250869d6
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-4-sparc64_2.4.27-9sarge6_sparc.deb
+ Size/MD5 checksum: 6390868 95135f6d77474f138d24322ccb7d505f
+ http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-headers-2.4-sparc32_42sarge3_sparc.deb
+ Size/MD5 checksum: 2232 746057a5e29dbdb064bcf4b772d7bf99
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-4-sparc64-smp_2.4.27-9sarge6_sparc.deb
+ Size/MD5 checksum: 6555152 1df415fa9711c74f3c344271bf8ecf0d
+
+
+ These files will probably be moved into the oldstable distribution on
its next update.
---------------------------------------------------------------------------------
diff --git a/dsa-texts/2.6.8-17sarge1 b/dsa-texts/2.6.8-17sarge1
new file mode 100644
index 00000000..1deac42f
--- /dev/null
+++ b/dsa-texts/2.6.8-17sarge1
@@ -0,0 +1,486 @@
+------------------------------------------------------------------------
+Debian Security Advisory DSA-1504 security@debian.org
+http://www.debian.org/security/ dann frazier
+February 22, 2008 http://www.debian.org/security/faq
+------------------------------------------------------------------------
+
+Package : kernel-source-2.6.8 (2.6.8-17sarge1)
+Vulnerability : several
+Problem-Type : local
+Debian-specific: no
+CVE ID : CVE-2006-5823 CVE-2006-6054 CVE-2006-6058 CVE-2006-7203
+ CVE-2007-1353 CVE-2007-2172 CVE-2007-2525 CVE-2007-3105
+ CVE-2007-3739 CVE-2007-3740 CVE-2007-3848 CVE-2007-4133
+ CVE-2007-4308 CVE-2007-4573 CVE-2007-5093 CVE-2007-6063
+ CVE-2007-6151 CVE-2007-6206 CVE-2007-6694 CVE-2008-0007
+
+Several local and remote vulnerabilities have been discovered in the Linux
+kernel that may lead to a denial of service or the execution of arbitrary
+code. The Common Vulnerabilities and Exposures project identifies the
+following problems:
+
+CVE-2006-5823
+
+ LMH reported a potential local DoS which could be exploited by a malicious
+ user with the privileges to mount and read a corrupted cramfs filesystem.
+
+CVE-2006-6054
+
+ LMH reported a potential local DoS which could be exploited by a malicious
+ user with the privileges to mount and read a corrupted ext2 filesystem.
+
+CVE-2006-6058
+
+ LMH reported an issue in the minix filesystem that allows local users
+ with mount privileges to create a DoS (printk flood) by mounting a
+ specially crafted corrupt filesystem.
+
+CVE-2006-7203
+
+ OpenVZ Linux kernel team reported an issue in the smbfs filesystem which
+ can be exploited by local users to cause a DoS (oops) during mount.
+
+CVE-2007-1353
+
+ Ilja van Sprundel discovered that kernel memory could be leaked via the
+ Bluetooth setsockopt call due to an uninitialized stack buffer. This
+ could be used by local attackers to read the contents of sensitive kernel
+ memory.
+
+CVE-2007-2172
+
+ Thomas Graf reported a typo in the DECnet protocol handler that could
+ be used by a local attacker to overrun an array via crafted packets,
+ potentially resulting in a Denial of Service (system crash).
+ A similar issue exists in the IPV4 protocol handler and will be fixed
+ in a subsequent update.
+
+CVE-2007-2525
+
+ Florian Zumbiehl discovered a memory leak in the PPPOE subsystem caused
+ by releasing a socket before PPPIOCGCHAN is called upon it. This could
+ be used by a local user to DoS a system by consuming all available memory.
+
+CVE-2007-3105
+
+ The PaX Team discovered a potential buffer overflow in the random number
+ generator which may permit local users to cause a denial of service or
+ gain additional privileges. This issue is not believed to effect default
+ Debian installations where only root has sufficient privileges to exploit
+ it.
+
+CVE-2007-3739
+
+ Adam Litke reported a potential local denial of service (oops) on
+ powerpc platforms resulting from unchecked VMA expansion into address
+ space reserved for hugetlb pages.
+
+CVE-2007-3740
+
+ Steve French reported that CIFS filesystems with CAP_UNIX enabled
+ were not honoring a process' umask which may lead to unintentinally
+ relaxed permissions.
+
+CVE-2007-3848
+
+ Wojciech Purczynski discovered that pdeath_signal was not being reset
+ properly under certain conditions which may allow local users to gain
+ privileges by sending arbitrary signals to suid binaries.
+
+CVE-2007-4133
+
+ Hugh Dickins discovered a potential local DoS (panic) in hugetlbfs.
+ A misconversion of hugetlb_vmtruncate_list to prio_tree may allow
+ local users to trigger a BUG_ON() call in exit_mmap.
+
+CVE-2007-4308
+
+ Alan Cox reported an issue in the aacraid driver that allows unprivileged
+ local users to make ioctl calls which should be restricted to admin
+ privileges.
+
+CVE-2007-4573
+
+ Wojciech Purczynski discovered a vulnerability that can be exploited
+ by a local user to obtain superuser privileges on x86_64 systems.
+ This resulted from improper clearing of the high bits of registers
+ during ia32 system call emulation. This vulnerability is relevant
+ to the Debian amd64 port as well as users of the i386 port who run
+ the amd64 linux-image flavour.
+
+CVE-2007-5093
+
+ Alex Smith discovered an issue with the pwc driver for certain webcam
+ devices. If the device is removed while a userspace application has it
+ open, the driver will wait for userspace to close the device, resulting
+ in a blocked USB subsystem. This issue is of low security impact as
+ it requires the attacker to either have physical access to the system
+ or to convince a user with local access to remove the device on their
+ behalf.
+
+CVE-2007-6063
+
+ Venustech AD-LAB discovered a a buffer overflow in the isdn ioctl
+ handling, exploitable by a local user.
+
+CVE-2007-6151
+
+ ADLAB discovered a possible memory overrun in the ISDN subsystem that
+ may permit a local user to overwrite kernel memory leading by issuing
+ ioctls with unterminated data.
+
+CVE-2007-6206
+
+ Blake Frantz discovered that when a core file owned by a non-root user
+ exists, and a root-owned process dumps core over it, the core file
+ retains its original ownership. This could be used by a local user to
+ gain access to sensitive information.
+
+CVE-2007-6694
+
+ Cyrill Gorcunov reported a NULL pointer dereference in code specific
+ to the CHRP PowerPC platforms. Local users could exploit this issue
+ to achieve a Denial of Service (DoS).
+
+CVE-2008-0007
+
+ Nick Piggin of SuSE discovered a number of issues in subsystems which
+ register a fault handler for memory mapped areas. This issue can be
+ exploited by local users to achieve a Denial of Service (DoS) and possibly
+ execute arbitrary code.
+
+The following matrix lists additional packages that were rebuilt for
+compatibility with or to take advantage of this update:
+
+ Debian 3.1 (sarge)
+ kernel-image-2.6.8-alpha 2.6.8-17sarge1
+ kernel-image-2.6.8-amd64 2.6.8-17sarge1
+ kernel-image-2.6.8-hppa 2.6.8-7sarge1
+ kernel-image-2.6.8-i386 2.6.8-17sarge1
+ kernel-image-2.6.8-ia64 2.6.8-15sarge1
+ kernel-image-2.6.8-m68k 2.6.8-5sarge1
+ kernel-image-2.6.8-s390 2.6.8-6sarge1
+ kernel-image-2.6.8-sparc 2.6.8-16sarge1
+ kernel-patch-powerpc-2.6.8 2.6.8-13sarge1
+ fai-kernels 1.9.1sarge8
+
+We recommend that you upgrade your kernel package immediately and reboot
+the machine. If you have built a custom kernel from the kernel source
+package, you will need to rebuild to take advantage of these fixes.
+
+Upgrade Instructions
+--------------------
+
+wget url
+ will fetch the file for you
+dpkg -i file.deb
+ will install the referenced file.
+
+If you are using the apt-get package manager, use the line for
+sources.list as given below:
+
+apt-get update
+ will update the internal database
+apt-get upgrade
+ will install corrected packages
+
+Debian 3.1 (oldstable)
+----------------------
+
+Oldstable updates are available for alpha, amd64, hppa, i386, ia64, m68k, powerpc, s390 and sparc.
+
+Source archives:
+
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-s390_2.6.8-6sarge1.dsc
+ Size/MD5 checksum: 846 4503eeaf9e1a21a9f220e2d9c31e0123
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-ia64_2.6.8-15sarge1.dsc
+ Size/MD5 checksum: 1191 bfba4b91bbd166d14d0bace5ac137715
+ http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-17sarge1.diff.gz
+ Size/MD5 checksum: 1124155 d0e37e157fd2c4a9889222377ae6a956
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-s390_2.6.8-6sarge1.tar.gz
+ Size/MD5 checksum: 18572 fffdd006af1f26150eb6131f10c14c8f
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-hppa_2.6.8-7sarge1.tar.gz
+ Size/MD5 checksum: 73206 97e4fadb9612c1a9ce969a0cbdc663f4
+ http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.9.1sarge8.dsc
+ Size/MD5 checksum: 621 fd5cf0a4b08aadf72cedb8029390fdeb
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-amd64_2.6.8-17sarge1.dsc
+ Size/MD5 checksum: 1103 27f8b65b1acae74eac82f6484edbc5e5
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-alpha_2.6.8-17sarge1.tar.gz
+ Size/MD5 checksum: 44625 4e68e046835cd0dce3ba2dc096f21924
+ http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-patch-powerpc-2.6.8_2.6.8-13sarge1.tar.gz
+ Size/MD5 checksum: 32565 406db278e655291be89254da5a4e15f8
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-hppa_2.6.8-7sarge1.dsc
+ Size/MD5 checksum: 1013 defcdc70dd9d969ddfaed2819b341758
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-ia64_2.6.8-15sarge1.tar.gz
+ Size/MD5 checksum: 69734 a5e62e3da21f1e89e1c7f76508de9673
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-amd64_2.6.8-17sarge1.tar.gz
+ Size/MD5 checksum: 82008 c90b3a12c9bf77807d0d5c3ab6cf1567
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-m68k_2.6.8-5sarge1.tar.gz
+ Size/MD5 checksum: 22997 75027ce480514543ad6d565d43890a3e
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-sparc_2.6.8-16sarge1.tar.gz
+ Size/MD5 checksum: 32414 676fdb7a2c0cb66cd6c13a75b836f755
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-sparc_2.6.8-16sarge1.dsc
+ Size/MD5 checksum: 1036 088234b948dd74a6c869f743a5346a54
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-alpha_2.6.8-17sarge1.dsc
+ Size/MD5 checksum: 812 e12f4f68ee249f53bab5b4752d6b2795
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-i386_2.6.8-17sarge1.tar.gz
+ Size/MD5 checksum: 96384 bd4d726f97468d6cca1139cf80b1342a
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-i386_2.6.8-17sarge1.dsc
+ Size/MD5 checksum: 1047 80bb021a47b74d6b1e486c2bba6c55b8
+ http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-17sarge1.dsc
+ Size/MD5 checksum: 1002 0a956bc9d48251885d52d4b4d4b07310
+ http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-patch-powerpc-2.6.8_2.6.8-13sarge1.dsc
+ Size/MD5 checksum: 1071 39e866b6617c57f4acf7e06d3b7ae82e
+ http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.9.1sarge8.tar.gz
+ Size/MD5 checksum: 32434 ee1ef40c64f09bcdc25d9c9b7ea325e0
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-m68k_2.6.8-5sarge1.dsc
+ Size/MD5 checksum: 874 9db0c07fe9a8cc114a82f3d4f8a209a9
+ http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8.orig.tar.gz
+ Size/MD5 checksum: 43929719 0393c05ffa4770c3c5178b74dc7a4282
+
+Architecture independent packages:
+
+ http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-17sarge1_all.deb
+ Size/MD5 checksum: 34955480 ece884d31c0a9bd290d467f00973252e
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-patch-2.6.8-s390_2.6.8-6sarge1_all.deb
+ Size/MD5 checksum: 16650 2304fae6c3d145826acea1403133ef98
+ http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-tree-2.6.8_2.6.8-17sarge1_all.deb
+ Size/MD5 checksum: 39758 12ee237ef5816a9c1f87697a0397802a
+ http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-doc-2.6.8_2.6.8-17sarge1_all.deb
+ Size/MD5 checksum: 6190062 e7e672dd30a416f98fb8dd3ead7e938b
+ http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-patch-debian-2.6.8_2.6.8-17sarge1_all.deb
+ Size/MD5 checksum: 1194926 dfc3e12e6e7739c91c17e150a7242fa2
+
+alpha architecture (DEC Alpha)
+
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-4-generic_2.6.8-17sarge1_alpha.deb
+ Size/MD5 checksum: 238146 8dd62b8c39cceeedd5efaa4b2eee4582
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-4-smp_2.6.8-17sarge1_alpha.deb
+ Size/MD5 checksum: 232626 0f789080227336bd274f4ddacc4a749b
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-4_2.6.8-17sarge1_alpha.deb
+ Size/MD5 checksum: 2765374 6f857f2bc6f2f0d5a94a98ae814c4e87
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-4-smp_2.6.8-17sarge1_alpha.deb
+ Size/MD5 checksum: 20094120 e0a3941fdaa513458f54b78e5b3ebd41
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-4-generic_2.6.8-17sarge1_alpha.deb
+ Size/MD5 checksum: 20242970 0944d9b857e2383f2748fab122de3a5d
+
+amd64 architecture (AMD x86_64 (AMD64))
+
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-13-em64t-p4-smp_2.6.8-17sarge1_amd64.deb
+ Size/MD5 checksum: 225228 fc7e590bc877da3505ee3442409bf8ee
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-13-em64t-p4_2.6.8-17sarge1_amd64.deb
+ Size/MD5 checksum: 228186 4663c6daf166b5559e408795f44d84f5
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-13-amd64-generic_2.6.8-17sarge1_amd64.deb
+ Size/MD5 checksum: 12579110 41c47936fe7cd1bb8e28177cf282e957
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-13-amd64-generic_2.6.8-17sarge1_amd64.deb
+ Size/MD5 checksum: 231428 dfdf341727fcca4af9ff41f7f0046e1b
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-13-amd64-k8-smp_2.6.8-17sarge1_amd64.deb
+ Size/MD5 checksum: 13238846 51bca8a45157f119dc001e786e325cca
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-13-em64t-p4-smp_2.6.8-17sarge1_amd64.deb
+ Size/MD5 checksum: 13063162 14486d83aee59b7616ff63de003340ac
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-13-amd64-k8_2.6.8-17sarge1_amd64.deb
+ Size/MD5 checksum: 13275762 767dcb70ca259ff0dc07f6cb8351a83d
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-13_2.6.8-17sarge1_amd64.deb
+ Size/MD5 checksum: 2728264 db7534ded22b911afffa5413d540dbbd
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-13-amd64-k8-smp_2.6.8-17sarge1_amd64.deb
+ Size/MD5 checksum: 226722 33c904e9fd0a2f754f0d5aed640a3bd3
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-13-amd64-k8_2.6.8-17sarge1_amd64.deb
+ Size/MD5 checksum: 230322 917d95bec917d2a7588867f81d88a2e9
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-13-em64t-p4_2.6.8-17sarge1_amd64.deb
+ Size/MD5 checksum: 13082028 78be67d79a13baba4a6c798624f7f818
+
+hppa architecture (HP PA RISC)
+
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-4_2.6.8-7sarge1_hppa.deb
+ Size/MD5 checksum: 2820206 0a14c1185bcde28d0a97eaeef9e11e3f
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-4-64_2.6.8-7sarge1_hppa.deb
+ Size/MD5 checksum: 17550802 fabf823c16fcb3e0bbf69d0081faafd8
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-4-64-smp_2.6.8-7sarge1_hppa.deb
+ Size/MD5 checksum: 219244 ff1d717d7b3d1db40c96d15b96b8a447
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-4-64-smp_2.6.8-7sarge1_hppa.deb
+ Size/MD5 checksum: 18374164 e088d77a7e64efa4d825416f94fd5db6
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-4-32-smp_2.6.8-7sarge1_hppa.deb
+ Size/MD5 checksum: 220054 5e8db88176af86cf5d5968dac2816ac6
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-4-32-smp_2.6.8-7sarge1_hppa.deb
+ Size/MD5 checksum: 17020158 1e3f2fc9f9764e1823054df8abde860c
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-4-32_2.6.8-7sarge1_hppa.deb
+ Size/MD5 checksum: 220598 e3419d467dc69e90e2db720c519268d3
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-4-32_2.6.8-7sarge1_hppa.deb
+ Size/MD5 checksum: 16110870 cb91278b4861aa27da3555e3ae05a842
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-4-64_2.6.8-7sarge1_hppa.deb
+ Size/MD5 checksum: 219758 ff98c244a5777bf1cb9d3aa42e92035b
+
+i386 architecture (Intel ia32)
+
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-4-k7-smp_2.6.8-17sarge1_i386.deb
+ Size/MD5 checksum: 258700 b406cff5cdfce0b1ebb0999b940bcf77
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-4-386_2.6.8-17sarge1_i386.deb
+ Size/MD5 checksum: 14079400 b3034d3d756026061d6d1ae64f7670ac
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-13-amd64-k8-smp_2.6.8-17sarge1_i386.deb
+ Size/MD5 checksum: 226622 89ab2fe13383be55139f779983e76f56
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-13-em64t-p4_2.6.8-17sarge1_i386.deb
+ Size/MD5 checksum: 228124 0232808c2f4af4679ff387fd5aef30c2
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-13-amd64-k8-smp_2.6.8-17sarge1_i386.deb
+ Size/MD5 checksum: 13238830 83c9fa536a5039d9b7faaedd55c0d2df
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-13-em64t-p4-smp_2.6.8-17sarge1_i386.deb
+ Size/MD5 checksum: 13208166 7d76aba45eeea785e68e144c93f8fa55
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-13-amd64-generic_2.6.8-17sarge1_i386.deb
+ Size/MD5 checksum: 231474 a9af96e38de18058a0bbb855ed0193f3
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-4-686_2.6.8-17sarge1_i386.deb
+ Size/MD5 checksum: 15558172 1ef83fe26c46d25f209cb0a76140c0e3
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-13-em64t-p4_2.6.8-17sarge1_i386.deb
+ Size/MD5 checksum: 13236626 fad30247937094d606a01d53a2eff086
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-13_2.6.8-17sarge1_i386.deb
+ Size/MD5 checksum: 2728376 e2538d185c863ac7adf9dd41ac73f83d
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-4-686-smp_2.6.8-17sarge1_i386.deb
+ Size/MD5 checksum: 15397692 580feea340f69d04fafcd052268bb314
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-4-k7-smp_2.6.8-17sarge1_i386.deb
+ Size/MD5 checksum: 15173410 f477356acda36ec633c3bee285794377
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-4_2.6.8-17sarge1_i386.deb
+ Size/MD5 checksum: 2784978 76f4162d37d785b5e0648435936774f6
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-4-386_2.6.8-17sarge1_i386.deb
+ Size/MD5 checksum: 263456 3ddcc23d88f64f8a185c3a3dc4ae3402
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-13-em64t-p4-smp_2.6.8-17sarge1_i386.deb
+ Size/MD5 checksum: 225052 c266db2ed1f497b91c8202c2e9511bd3
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-4-k7_2.6.8-17sarge1_i386.deb
+ Size/MD5 checksum: 15282426 bce3bfbc0e6aede5dc503b37935b050a
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-13-amd64-k8_2.6.8-17sarge1_i386.deb
+ Size/MD5 checksum: 230266 2172a8e3ff5107cb582b5a31111b904b
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-4-686-smp_2.6.8-17sarge1_i386.deb
+ Size/MD5 checksum: 258222 e02e548b571117fa3a0b68add40c3893
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-4-686_2.6.8-17sarge1_i386.deb
+ Size/MD5 checksum: 260930 a4765a3da36be625c104281daecc29d2
+ http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.9.1sarge8_i386.deb
+ Size/MD5 checksum: 12010766 5c06b0a78b203b2032aa327839fa9795
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-4-k7_2.6.8-17sarge1_i386.deb
+ Size/MD5 checksum: 260956 5bf06a1619132b0624299735caf26879
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-13-amd64-generic_2.6.8-17sarge1_i386.deb
+ Size/MD5 checksum: 12579278 f6c685f628478fcc8f37257a6e71aedd
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-13-amd64-k8_2.6.8-17sarge1_i386.deb
+ Size/MD5 checksum: 13276128 541fc888c5aa5dee5e186185d1f2256f
+
+ia64 architecture (Intel ia64)
+
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-4-itanium_2.6.8-15sarge1_ia64.deb
+ Size/MD5 checksum: 21496770 8336b695564c2eb6d8dc98a13c3b4e1a
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-4-itanium-smp_2.6.8-15sarge1_ia64.deb
+ Size/MD5 checksum: 205878 2f8285b89e03dee6c71f9d8079d13499
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-mckinley-smp_2.6.8-15sarge1_ia64.deb
+ Size/MD5 checksum: 12228 b69b46b5a764b898baaf3ba3ad056d5f
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-mckinley_2.6.8-15sarge1_ia64.deb
+ Size/MD5 checksum: 12162 3d5dfd32448f8cb967dd1ce9549789af
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-4_2.6.8-15sarge1_ia64.deb
+ Size/MD5 checksum: 3104422 af94110dd2e8401a975315dd93aaa28b
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-mckinley_2.6.8-15sarge1_ia64.deb
+ Size/MD5 checksum: 12172 618961c987120133ee1c999e4cf5f62f
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-mckinley-smp_2.6.8-15sarge1_ia64.deb
+ Size/MD5 checksum: 12236 7ca412f9885d85f92340423de43e284f
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-itanium_2.6.8-15sarge1_ia64.deb
+ Size/MD5 checksum: 12140 031a5db578a7291bf25c13b7be4b4ec6
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-4-itanium_2.6.8-15sarge1_ia64.deb
+ Size/MD5 checksum: 206340 85610c56d71469abb003503c9395f639
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-4-mckinley_2.6.8-15sarge1_ia64.deb
+ Size/MD5 checksum: 206076 62768e32c962c2f1f2f19c0062800557
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-itanium-smp_2.6.8-15sarge1_ia64.deb
+ Size/MD5 checksum: 12202 a4a24b0e48c4f6c2c3d8ab17fc6fe4ae
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-4-mckinley_2.6.8-15sarge1_ia64.deb
+ Size/MD5 checksum: 21417820 daa90c69a36eb5baf3231fed495766e1
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-4-mckinley-smp_2.6.8-15sarge1_ia64.deb
+ Size/MD5 checksum: 205672 e5befe9b90d7f8d43ed7e1dfff89851c
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-4-itanium-smp_2.6.8-15sarge1_ia64.deb
+ Size/MD5 checksum: 22158208 8a186facbb3023845284531d27c01486
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-itanium_2.6.8-15sarge1_ia64.deb
+ Size/MD5 checksum: 12136 fe3ae95000fba99026557e9f3110eef9
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-4-mckinley-smp_2.6.8-15sarge1_ia64.deb
+ Size/MD5 checksum: 22174026 de343e5cddd6936ec435cdc87d5ab689
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-itanium-smp_2.6.8-15sarge1_ia64.deb
+ Size/MD5 checksum: 12200 75abbf3dc640b0765b0f510c0c783ecb
+
+m68k architecture (Motorola Mc680x0)
+
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-sun3_2.6.8-5sarge1_m68k.deb
+ Size/MD5 checksum: 2997446 90b62190daab090dd211b2e2fa76e634
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-mvme16x_2.6.8-5sarge1_m68k.deb
+ Size/MD5 checksum: 3053150 9876f36e6cbad66ac690362955b3ee6c
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-q40_2.6.8-5sarge1_m68k.deb
+ Size/MD5 checksum: 3111618 38fdf55f9f32aa26df0b3001fd6b77a2
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-amiga_2.6.8-5sarge1_m68k.deb
+ Size/MD5 checksum: 3311580 052d54a9c2e6eab73cf870634aaf78e3
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-hp_2.6.8-5sarge1_m68k.deb
+ Size/MD5 checksum: 2992404 cd498a3a110af341e7052fb06ec8b0bc
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-mac_2.6.8-5sarge1_m68k.deb
+ Size/MD5 checksum: 3178962 1160ae756c286e7e2845cbeb1326c3bb
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-mvme147_2.6.8-5sarge1_m68k.deb
+ Size/MD5 checksum: 2982482 677c66d0af2580084d6d061bfd63ffd4
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-bvme6000_2.6.8-5sarge1_m68k.deb
+ Size/MD5 checksum: 3018000 89321aa5c34c8c9c95a61a86d0337699
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-atari_2.6.8-5sarge1_m68k.deb
+ Size/MD5 checksum: 3105192 0a020af9116bd8ac96d2c3eb054b6840
+
+powerpc architecture (PowerPC)
+
+ http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-headers-2.6.8-4_2.6.8-13sarge1_powerpc.deb
+ Size/MD5 checksum: 5153168 2f57ad5241d60f31e262541b1b9bf08a
+ http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-4-power3-smp_2.6.8-13sarge1_powerpc.deb
+ Size/MD5 checksum: 13953866 46a1861b3cd33737bdd60a0f72f397c4
+ http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-4-power3_2.6.8-13sarge1_powerpc.deb
+ Size/MD5 checksum: 13599558 0ddb46fa72e94a9018eccfd3d2f0b40c
+ http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-4-powerpc-smp_2.6.8-13sarge1_powerpc.deb
+ Size/MD5 checksum: 13873214 f012b664fbc58bfcdfbba594d38bc855
+ http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-4-power4-smp_2.6.8-13sarge1_powerpc.deb
+ Size/MD5 checksum: 13943782 153a4ba86086ae315977b069a3c8fa3c
+ http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-4-power3_2.6.8-13sarge1_powerpc.deb
+ Size/MD5 checksum: 412788 719ae014adea5b6a7c3c36b2b0e268ed
+ http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-4-powerpc_2.6.8-13sarge1_powerpc.deb
+ Size/MD5 checksum: 412382 228e63e6d49179b0dc802b903b1b52e4
+ http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-4-power4-smp_2.6.8-13sarge1_powerpc.deb
+ Size/MD5 checksum: 411974 bcf255c3858b2d9a01bbbb2b7c25aff2
+ http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-4-powerpc_2.6.8-13sarge1_powerpc.deb
+ Size/MD5 checksum: 13616728 e6762f501e5422e23f023b79037a8ca5
+ http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-4-power4_2.6.8-13sarge1_powerpc.deb
+ Size/MD5 checksum: 412034 0334c1128e3e843ebc68963633480ba4
+ http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-4-powerpc-smp_2.6.8-13sarge1_powerpc.deb
+ Size/MD5 checksum: 412136 a761c81f7e2c38637fecefeb197f8a5b
+ http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-4-power3-smp_2.6.8-13sarge1_powerpc.deb
+ Size/MD5 checksum: 412708 584de35626e4445772f28341560aae76
+ http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-4-power4_2.6.8-13sarge1_powerpc.deb
+ Size/MD5 checksum: 13583634 0f334a6487d58f02b75f9102641d4541
+
+s390 architecture (IBM S/390)
+
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-4-s390x_2.6.8-6sarge1_s390.deb
+ Size/MD5 checksum: 3199350 2dec14becfc609e1414a00a726a78153
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-4-s390_2.6.8-6sarge1_s390.deb
+ Size/MD5 checksum: 2992448 d90f45f8f995286690ed2c460f5f418b
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-headers-2.6.8-4_2.6.8-6sarge1_s390.deb
+ Size/MD5 checksum: 5092100 c603b5b67a2e4be7b92fc909a64493cd
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-4-s390-tape_2.6.8-6sarge1_s390.deb
+ Size/MD5 checksum: 1150168 8cf8f4a0193c71df9a27b3362b868cc5
+
+sparc architecture (Sun SPARC/UltraSPARC)
+
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-4-sparc64-smp_2.6.8-16sarge1_sparc.deb
+ Size/MD5 checksum: 7645904 2c30dc864de96d05d0a3426b36c26d3a
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-4_2.6.8-16sarge1_sparc.deb
+ Size/MD5 checksum: 2896286 54cdf0c85119d5a049164705e54a24d9
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-4-sparc32_2.6.8-16sarge1_sparc.deb
+ Size/MD5 checksum: 4563634 2df1caceab9295aca03f8efb9abfa33a
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-4-sparc64_2.6.8-16sarge1_sparc.deb
+ Size/MD5 checksum: 7449244 1833928627fd502581b283c8d508b423
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-4-sparc32_2.6.8-16sarge1_sparc.deb
+ Size/MD5 checksum: 116254 ccfa57772f57fc041c7e2f52fc09216c
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-4-sparc64-smp_2.6.8-16sarge1_sparc.deb
+ Size/MD5 checksum: 151548 0170da5a8e3a7179073a6ee42fe41b27
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-build-2.6.8-4_2.6.8-16sarge1_sparc.deb
+ Size/MD5 checksum: 10856 5866644f6a69cd14120b2f27b936097e
+ http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-4-sparc64_2.6.8-16sarge1_sparc.deb
+ Size/MD5 checksum: 150948 ed82830f3020847472660683d0a8b5cd
+
+ These files will probably be moved into the oldstable distribution on
+ its next update.
+
+---------------------------------------------------------------------------------
+For apt-get: deb http://security.debian.org/ stable/updates main
+For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
+Mailing list: debian-security-announce@lists.debian.org
+Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>

© 2014-2024 Faster IT GmbH | imprint | privacy policy